{"id":2384,"date":"2024-10-22T11:11:31","date_gmt":"2024-10-22T11:11:31","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/22\/malicious-npm-packages-target-developers-ethereum-wallets-with-ssh-backdoor\/"},"modified":"2024-10-22T11:11:31","modified_gmt":"2024-10-22T11:11:31","slug":"malicious-npm-packages-target-developers-ethereum-wallets-with-ssh-backdoor","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/22\/malicious-npm-packages-target-developers-ethereum-wallets-with-ssh-backdoor\/","title":{"rendered":"Malicious npm Packages Target Developers&#8217; Ethereum Wallets with SSH Backdoor"},"content":{"rendered":"<p>\u200bCybersecurity researchers have discovered a number of suspicious packages published to the npm registry that are designed to harvest Ethereum private keys and gain remote access to the machine via the secure shell (SSH) protocol.<br \/>\nThe packages attempt to &#8220;gain SSH access to the victim&#8217;s machine by writing the attacker\u2019s SSH public key in the root user\u2019s authorized_keys file,&#8221; software supply\u00a0Cybersecurity researchers have discovered a number of suspicious packages published to the npm registry that are designed to harvest Ethereum private keys and gain remote access to the machine via the secure shell (SSH) protocol.<br \/>\nThe packages attempt to &#8220;gain SSH access to the victim&#8217;s machine by writing the attacker\u2019s SSH public key in the root user\u2019s authorized_keys file,&#8221; software supply\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have discovered a number of suspicious packages published to the npm registry that are designed to harvest Ethereum private keys and gain remote access to the machine via the secure shell (SSH) protocol. The packages attempt to &#8220;gain SSH access to the victim&#8217;s machine by writing the attacker\u2019s SSH public key in the&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/22\/malicious-npm-packages-target-developers-ethereum-wallets-with-ssh-backdoor\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Malicious npm Packages Target Developers&#8217; Ethereum Wallets with SSH Backdoor<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":2385,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2384"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=2384"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2384\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/2385"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=2384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=2384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=2384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}